s3: Lift the server_messaging_context from notify_job_status
[Samba/gbeck.git] / source3 / winbindd / wb_sid2uid.c
blob9c22b8d10bd399a688bdfdb1f88f0c697d33c7e9
1 /*
2 Unix SMB/CIFS implementation.
3 async sid2uid
4 Copyright (C) Volker Lendecke 2009
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "winbindd.h"
22 #include "librpc/gen_ndr/cli_wbint.h"
24 struct wb_sid2uid_state {
25 struct tevent_context *ev;
26 struct dom_sid sid;
27 char *dom_name;
28 uint64 uid64;
29 uid_t uid;
32 static void wb_sid2uid_lookup_done(struct tevent_req *subreq);
33 static void wb_sid2uid_done(struct tevent_req *subreq);
35 struct tevent_req *wb_sid2uid_send(TALLOC_CTX *mem_ctx,
36 struct tevent_context *ev,
37 const struct dom_sid *sid)
39 struct tevent_req *req, *subreq;
40 struct wb_sid2uid_state *state;
41 bool expired;
43 req = tevent_req_create(mem_ctx, &state, struct wb_sid2uid_state);
44 if (req == NULL) {
45 return NULL;
47 sid_copy(&state->sid, sid);
48 state->ev = ev;
50 if (winbindd_use_idmap_cache()
51 && idmap_cache_find_sid2uid(sid, &state->uid, &expired)) {
53 DEBUG(10, ("idmap_cache_find_sid2uid found %d%s\n",
54 (int)state->uid, expired ? " (expired)": ""));
56 if (!expired || is_domain_offline(find_our_domain())) {
57 if (state->uid == -1) {
58 tevent_req_nterror(req, NT_STATUS_NONE_MAPPED);
59 } else {
60 tevent_req_done(req);
62 return tevent_req_post(req, ev);
67 * We need to make sure the sid is of the right type to not flood
68 * idmap with wrong entries
71 subreq = wb_lookupsid_send(state, ev, &state->sid);
72 if (tevent_req_nomem(subreq, req)) {
73 return tevent_req_post(req, ev);
75 tevent_req_set_callback(subreq, wb_sid2uid_lookup_done, req);
76 return req;
79 static void wb_sid2uid_lookup_done(struct tevent_req *subreq)
81 struct tevent_req *req = tevent_req_callback_data(
82 subreq, struct tevent_req);
83 struct wb_sid2uid_state *state = tevent_req_data(
84 req, struct wb_sid2uid_state);
85 struct winbindd_domain *domain;
86 const char *domname;
87 const char *name;
88 enum lsa_SidType type;
89 NTSTATUS status;
90 struct winbindd_child *child;
92 status = wb_lookupsid_recv(subreq, talloc_tos(), &type, &domname,
93 &name);
94 if (!NT_STATUS_IS_OK(status)) {
95 tevent_req_nterror(req, status);
96 return;
99 if ((type != SID_NAME_USER) && (type != SID_NAME_COMPUTER)) {
100 DEBUG(5, ("Sid %s is not a user or a computer.\n",
101 sid_string_dbg(&state->sid)));
103 * We have to set the cache ourselves here, the child
104 * which is normally responsible was not queried yet.
106 idmap_cache_set_sid2uid(&state->sid, -1);
107 tevent_req_nterror(req, NT_STATUS_INVALID_SID);
108 return;
111 domain = find_domain_from_sid_noinit(&state->sid);
114 * TODO: Issue a gettrustinfo here in case we don't have "domain" yet?
117 if ((domain != NULL) && domain->have_idmap_config) {
118 state->dom_name = domain->name;
119 } else {
120 state->dom_name = NULL;
123 child = idmap_child();
125 subreq = rpccli_wbint_Sid2Uid_send(state, state->ev, child->rpccli,
126 state->dom_name, &state->sid,
127 &state->uid64);
128 if (tevent_req_nomem(subreq, req)) {
129 return;
131 tevent_req_set_callback(subreq, wb_sid2uid_done, req);
134 static void wb_sid2uid_done(struct tevent_req *subreq)
136 struct tevent_req *req = tevent_req_callback_data(
137 subreq, struct tevent_req);
138 struct wb_sid2uid_state *state = tevent_req_data(
139 req, struct wb_sid2uid_state);
140 NTSTATUS status, result;
142 status = rpccli_wbint_Sid2Uid_recv(subreq, state, &result);
143 TALLOC_FREE(subreq);
144 if (!NT_STATUS_IS_OK(status)) {
145 tevent_req_nterror(req, status);
146 return;
148 if (!NT_STATUS_IS_OK(result)) {
149 tevent_req_nterror(req, result);
150 return;
153 state->uid = state->uid64;
154 tevent_req_done(req);
157 NTSTATUS wb_sid2uid_recv(struct tevent_req *req, uid_t *uid)
159 struct wb_sid2uid_state *state = tevent_req_data(
160 req, struct wb_sid2uid_state);
161 NTSTATUS status;
163 if (tevent_req_is_nterror(req, &status)) {
164 return status;
166 *uid = state->uid;
167 return NT_STATUS_OK;